Search Results - (( java applications security algorithm ) OR ( parameter classification modified algorithm ))
Search alternatives:
- parameter classification »
- classification modified »
- java applications »
-
1
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…For this experiment, the modified word vectors serve as input to train a Machine Learning (ML) model for the text classification process, aiming for the developed ML model to have a significantly smaller parameter count. …”
Get full text
Get full text
Thesis -
2
-
3
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
4
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
Get full text
Get full text
Article -
5
Modified anfis architecture with less computational complexities for classification problems
Published 2018“…The results show that the proposed modified ANFIS architecture with gaussian membership function and Artificial Bee Colony (ABC) optimization algorithm, on average has achieved classification accuracy of 99.5% with 83% less computational complexity.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
Published 2020“…Technically, BFOA has been applied as supplementary algorithm for optimizing weight, parameters for other classifier algorithms and selecting optimised features for other classifiers. …”
Get full text
Get full text
Get full text
Thesis -
7
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
8
Aco-based feature selection algorithm for classification
Published 2022“…The proposed EGCACO algorithm can be utilised for FS in DNA microarray classification tasks that involve large dataset size in various application domains.…”
Get full text
Get full text
Thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
10
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…Furthermore, using SVM requires the user to set certain parameters values, including kernel type and kernel parameters, since these parameters own a significant effect on the effectiveness of SVM. …”
Get full text
Get full text
Thesis -
11
-
12
Analysis of multicomponent transient signals using music superresolution technique
Published 2008“…A new method of analysis using modified MUSIC (multiple signal classification) subspace algorithm is successfully applied to the analysis of this signal. …”
Get full text
Get full text
Proceeding Paper -
13
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
Published 2015“…Mine Blast Algorithm (MBA) which has been improved by Improved MBA (IMBA) can be further improved by modifying its exploitation phase. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
16
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Experimental results of the EBGWO algorithm on the NSL-KDD dataset in terms of number of selected features and classification accuracy are superior to other benchmark optimisation algorithms. …”
Get full text
Get full text
Thesis -
17
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis
